Windows Search protocol

Winsage
September 2, 2025
Cybercriminals have developed a sophisticated variant of the ClickFix scam, utilizing human-verification social engineering and the Windows search protocol to deploy MetaStealer, an infostealer that steals credentials and sensitive data. The attack begins when a target searches for the legitimate AnyDesk tool and is redirected to a phishing page featuring a deceptive human-verification prompt. This page uses a search-ms URI scheme to connect to an attacker-controlled SMB share, presenting a malicious Windows shortcut disguised as a PDF. Executing this shortcut downloads the legitimate AnyDesk installer and retrieves a malicious "PDF" from an external server. The MSI package contains a dropper (ls26.exe) that operates similarly to known MetaStealer samples, scanning for browser credentials and exfiltrating data. The attack circumvents user suspicion by mimicking a legitimate application installation. Organizations are advised to implement strict application whitelisting, monitor Windows protocol handlers, educate users about suspicious prompts, and deploy detection rules to mitigate these threats.
Winsage
June 16, 2024
- Microsoft has established "Open App Store Principles" for its Windows store and future marketplaces. - A phishing campaign is targeting the Windows Search protocol, using HTML attachments to download malicious files from remote servers. - Jason Kent from Cequence advises proactive vulnerability management to prevent such attacks, suggesting disabling search functionality within hosts and analyzing all email attachments to avoid similar threats.
Search